EC-Council Cyber Certification Overview

EC-Council Certification For The Cyber Security Professional

EC-Council is one of the leading providers of cyber security certifications with its flagship Certified Ethical Hacker (CEH)  recognised worldwide. The US Department of Defense as well as the National Security Agency and Pentagon  have approved several EC-Council certification for use in works categories defined for cyber security roles.

The EC-Council certifications have a strong technical focus and cover a wide range of cyber security topics in-depth providing successful candidates with a ceritfication that is accepted world wide. Most of their certifications consist of a practical as well as a mutliple choice exam.

At Jumping Bean we offer the following EC-Council training courses.

Training Course Formats

We offer our training courses in a range of formats to suit the needs of our students and customers:

  • Short Course: This take the form of full day, instructor led, training sessions . It is best suited for corporates or those who already have experience in cyber security but wish to take an refresher course before sitting the exam.
  • Virtual Instructor Lead Course: This is run either online full time, as above, or part time. The part-time training  is held twice a week in the evenings, onlinr from 6:30 - 7:30.  This is ideal for students who cannot attend full day classes or for students who wish to work through the material between lectures to consolidate their understanding.
  • Online, Mentor lead training: This take the form of self-paced training with access to a mentor via mail, web chat or video call should a student require assistance to work though some key concepts or material.

What-ever your constraints we will have a format to accommodate you!

CND & CHFI

Specialist Certifications CND & CHFI

Before attempting the CEH course one should have a solid background in computing concepts and networking. The certified Network Defender (CND) certification is one way to obtain the background necessary to successfully complete CEH.

The CHFI Certified Hacking Forensic Investigator certification is a specialisation course for those students who wish to investigate cyber security incidents. This may be from external or internal actors and may be criminal, civil or administrative investigations.

Certified Network Defender

CND is aimed at skilling students up in detecting and preventing system compromise and in configuring system defences to maintain system integrigty, confidentiality and availability.

CND  trains students to adopt a process continuos improvement in system defenses with respect to detecting and preventing cyber attacks.

CND is a mapped to the cybersecurity education framework and work role task analysis developed by the National Initiative of Cybersecurity Education (NICE).

In addition the certification has been approved by the Department of Defense (DoD) for the work category roles for system and network administrators.

Our training course  cover the latest version of the certification. The previous version of the course, while it is still valid, is available on request.

Course Objectives:

  • Network Attacks and Defense Strategies
  • Administrative Network Security
  • Technical Network Security
  • Network Perimeter Security
  • Endpoint Security-Windows Systems
  • Endpoint Security-Linux Systems
  • Endpoint Security- Mobile Devices
  • Endpoint Security-IoT Devices
  • Administrative Application Security
  • Data Security
  • Enterprise Virtual Network Security
  • Enterprise Cloud Network Security
  • Enterprise Wireless Network Security
  • Network Traffic Monitoring and Analysis
  • Network Logs Monitoring and Analysis
  • Incident Response and Forensic Investigation
  • Business Continuity and Disaster Recovery
  • Risk Anticipation with Risk Management
  • Threat Assessment with Attack Surface Analysis
  • Threat Prediction with Cyber Threat Intelligence

Certified Hacking Forensic Investigator

CHFI trains students how to carry out digital investigations to determine how a machine was compromised, what was compromised, who the threat actor was and their objectives. Students will learn how to extract evidence of the attack for use in internal audits or civil or criminal cases. Investigations can cover acts of theft of trade secrets, theft of or destruction of intellectual property, fraud and industrial espionage. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.

Our training course always cover the latest version of the certification. The previous version of the course, while it is still valid, is available on request.

Course Objectives:

  • Computer Forensics in Today's World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigation using Access Data FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness
CoursePrice (inc exams)
Certified Network DefenderR17,500
Certified Hacking Forensic InvestigatorR21,800

CEH & ECSA

EC-Council's Premier Certifications - CEH & ECSA

The most well known certification from EC-Council is the Certifed Ethical Hacker  Certification. This highly respected course has been approved by the Pentagon and the US department of defense for including in their cyber security training  portfolio.

By itself the CEH course teachs one the techniques hackers use to gain access to systems whils the follow on Security Anaylst course provides students with the skill to manage a pentration assignment from engagement to the delivery of the final report. Together both certifications provide proof to employers of ones skill in conducting cyber security assignements.

Certified Ethical Hacker

CEH is the premier certification from EC-Council. This course teaches students the tools and techniques used by hackers to compromise systems.

After completing this course a student will be able to view their own organisation's infrastrucutre from the perspective of a threat actor, whether internal or external. It will enable students to assess their own organisations defenses and responses to these threats. 

Course Objectives:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography

Certified Security Analyst

CHFI trains students how to carry out digital investigations to determine how a machine was compromised, what was compromised, who the threat actor was and their objectives. Students will learn how to extract evidence of the attack for use in internal audits or civil or criminal cases. Investigations can cover acts of theft of trade secrets, theft of or destruction of intellectual property, fraud and industrial espionage. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.

Our training course always cover the latest version of the certification. The previous version of the course, while it is still valid, is available on request.

Course Objectives:

  • Computer Forensics in Today's World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigation using Access Data FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness
CoursePrice (inc exams)
Certified Ethical HackerR21,000
Certified Hacking Forensic InvestigatorR21,800

Our Clients

Our Clients

​​​​​​​

 

 

​​​​

​​​​​​​​​​​​​

About Us

About Us

Jumping Bean is an open source integration and training company that has been delivering solutions to customers for over 20 years.

 

Our services include:

Jumping Bean Services
Linux
  • SLA support
  • Adhoc support
  • Hardening
  • Solutions architecture
Postgres
  • SLA based support
  • Implementation support
  • Solutions Architecture
  • Performance tuning
DevOps
  • Advisory services
  • Implemenation support
  • Consulting
  • SLA support
  • Training
Big Data
  • Google & AWS Big Data support
  • Data flow architecture
  • Implementation support
  • Training
Security
  • Advisory Services
  • SOC service
  • Security Audits & Reviews
  • Training
Software Development
  • Mobile Apps
  • Enterprise Apps

Cloud Consulting

  • Migration
  • Cloud provider support
  • Work flow architecture
  • Automation
  • Big Data
  • Containerisation
  

Long-Term Partnerships

We build long relationships with our customers which helps us better  understand their needs and offer customised solutions and training to meet their business requirements.

Our clients include large and small businesses in South Africa and across the globe.  We offer both remote and on-site support.

Passion for Technology

We are passionate about open source and love living on the bleeding edge of technology innovation. Our customers lean our our practical experience with emerging technologies to ensure they get the benefits of early adopters and avoid the pitfalls.

Contact Form

Jumping Bean Contact Form!